Results 41 to 50 of about 922,831 (255)
Persuasiveness of inclusive language in organizational communication
The study hypothesized that employees better receive messages containing inclusive forms. A review of the existing literature on inclusive language and its impact on employee well-being and organizational innovation was conducted.
Jacek Wasilewski, Agata Kostrzewa
doaj +1 more source
Defense against Insider Threat: a Framework for Gathering Goal-based Requirements [PDF]
Insider threat is becoming comparable to outsider threat in frequency of security events. This is a worrying situation, since insider attacks have a high probability of success because insiders have authorized access and legitimate privileges.
Franqueira, Virginia Nunes Leal+1 more
core +3 more sources
Layered Security Guidance for Data Asset Management in Additive Manufacturing [PDF]
Manufacturing industries are increasingly adopting additive manufacturing (AM) technologies to produce functional parts in critical systems. However, the inherent complexity of both AM designs and AM processes render them attractive targets for cyber-attacks.
arxiv
A study of mechanical properties and fractography of PBF‐LB/M‐built Inconel 718, performing heat treatments and hot‐isostatic pressing, is presented. Ultimate tensile strength and fatigue behavior are evaluated, examining differences in maximum load behavior, elongation, and regimes of fatigue.
David Sommer+3 more
wiley +1 more source
Buffer or Enabler? The Effect of Financial Slack on R&D Investment in Different Environments
Prior studies have shown mixed findings on the role of financial slack. This study examines how environmental factors such as munificence, dynamism, and complexity moderate the relationship between financial slack and innovation activity. Using data from
Hye Kyung Yu, Minji Kim, Tohyun Kim
doaj +1 more source
How does intellectual capital align with cyber security? [PDF]
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their ...
Renaud, Karen+2 more
core +2 more sources
Laboratory protocols for producing thin‐film pH electrodes for sterilized single‐use technologies have been successfully developed into a semiautomated workflow, with higher throughput and precision of membrane thickness. Accuracies are within 0.05 pH units versus ground truth, and uncertainty analysis reveals the largest sources of error to be derived
Bingyuan Zhao+4 more
wiley +1 more source
Computer Vision-Based Risk Assessment on Heterogeneous Mobile Network Operating Environments
In order to logically prioritize the urgent risks in the heterogeneous mobile network operating environment, we derive environmental factors that can reflect the characteristics of the heterogeneous network operating environment and present them as an ...
Youngjun Kim, Namkyun Baik
doaj +1 more source
A materials and device design concept that comprises a self‐assembled ultra‐thin epitaxial ion‐transporting layer, an amorphous oxide overcoat oxygen‐blocking layer, and a partial filament formed during an electroforming step is proposed for low‐current multilevel resistive switching devices.
Ming Xiao+17 more
wiley +1 more source
In recent years, concepts and components of information technology (IT) have made their way into the shop floor, today better known as operational technology (OT).
Mukund Bhole+2 more
doaj +1 more source